EP3035641A1 - Method for file upload to cloud storage system, download method and device - Google Patents

Method for file upload to cloud storage system, download method and device Download PDF

Info

Publication number
EP3035641A1
EP3035641A1 EP14794751.9A EP14794751A EP3035641A1 EP 3035641 A1 EP3035641 A1 EP 3035641A1 EP 14794751 A EP14794751 A EP 14794751A EP 3035641 A1 EP3035641 A1 EP 3035641A1
Authority
EP
European Patent Office
Prior art keywords
file
key
cloud storage
storage system
data file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP14794751.9A
Other languages
German (de)
French (fr)
Other versions
EP3035641A4 (en
Inventor
Sujing ZHOU
Xiaohua Chen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Publication of EP3035641A1 publication Critical patent/EP3035641A1/en
Publication of EP3035641A4 publication Critical patent/EP3035641A4/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Definitions

  • the present invention relates to the technical field of uploading files to a cloud storage system, and more particularly, to a method for uploading files to a cloud storage system, a downloading method and device.
  • cloud storage users can upload their files to the cloud storage environment for the cloud storage service provider to carry out the file management, and designate access rights to other users for accessing the files, thus achieving the file sharing.
  • the cloud storage environment makes the data owners lose complete control of the data, which makes the data security face a series of threats, such as: DOS attacks using large-scale botnets, attacks exploiting vulnerabilities of operating systems or application service protocols, as well as malicious attacks, theft and illegal misuse target the user privacy information stored in the "cloud", etc., and there are various means for that.
  • various systems and applications residing in the "cloud” still have to face threats such as viruses, Trojans and other malicious software tools which are faced in the traditional stand-alone machine or intra-net environment. If sensitive data (including: financial documents, personal medical records) are stored in a cloud storage environment controlled by others, the above mentioned problems will become more serious with the number of users who share the storage increasing. Therefore, systems based on cloud storage services have very urgent needs for security mechanisms.
  • the embodiment of the present invention is to provide a method for uploading files to a cloud storage system, a downloading method and device, to solve the problem in the related art that data storage security in a cloud storage system is relatively poor.
  • the file information comprises: a file name, a file identifier and a last modification time extracted from the original data file.
  • the step of performing a security processing on an original data file according to the file key and generating a secure data file comprises:
  • an encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key; a key used for performing an integrity protection processing on the original data file is: the file key, or a second derived key derived based on the file key.
  • a method for downloading files from a cloud storage system comprising:
  • the related file information comprises: a secure metadata file.
  • the secure metadata file comprises one or more of a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list.
  • the step of performing a security analysis processing on the secure data file based on the file key comprises:
  • a device for uploading files to a cloud storage system applied to a client end, and comprising a first generating module, a first processing module and an uploading module, wherein:
  • a device for downloading files from a cloud storage system comprising a downloading module, a second generating module and a second processing module, wherein:
  • the method for uploading files to a cloud storage system in accordance with an embodiment of the present invention provides an end-to-end confidentiality and integrity protection for data stored by a user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
  • the method for uploading files to a cloud storage system in accordance with an embodiment of the present invention is applied to the client end and comprises:
  • the method for uploading files to the cloud storage system in accordance with the embodiment of the present invention, firstly, when the user uploads a data file at the client end, firstly a file key is generated, and then a security processing is performed on the original data file based on the file key and a secure data file is generated, and then the secure data file is sent to the cloud storage system for storage. It provides an end-to-end confidentiality and integrity protection for data stored by the user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
  • the file key is generated based on a pre-generated user key and at least file information
  • the following specific embodiments are used for illustration rather than limitation:
  • the file information includes but is not limited to: a file name, a file identifier, and optionally, a last modification time extracted from the original data file.
  • the user information may be a user name, a user identifier, and so on, which are not enumerated herein.
  • the information input by the user can be password information.
  • the step of performing a security processing on the original data file based on the file key and generating a secure data file comprises:
  • the encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key;
  • the key used for performing an integrity protection processing on the original data file is: the file key, or a second derived key derived based on the file key.
  • part or all of the content of the original data file is encrypted based on the file key, and/or integrity protection processing is performed; keys used in the encryption and integrity protection may be different; the processing order of the encryption and the integrity protection is not restricted, the encryption may be performed first, and then integrity protection is performed on the cipher text; or integrity protection is performed on the original data file first, and then encryption is performed.
  • the secure data file and the information for generating the file key, except of the user key, are sent to the cloud storage system to improve the data storage security.
  • the embodiment of the present invention further provides a method for downloading files from the cloud storage system, comprising:
  • the secure data file sent by the cloud storage system according to the downloading request is received, and then a file key is generated, a security analysis processing is performed on the secure data file according to the file key, so as to solve the problem that the data storage security in the cloud storage system is relatively poor.
  • the related file information comprises: a secure metadata file.
  • the secure metadata file may comprise one or more of a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list.
  • the secure metadata file comprises a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list, but what is shown in FIG. 3 is only an example of the secure metadata file, the content and format of the secure metadata file are not limited to the content and format shown in FIG.
  • the secure metadata file may also comprise: the file name, the file identifier, the file owner identifier, the last modification time, the security processing time, the random information, the security parameter and the access control list; the secure metadata file may further comprise other content.
  • the information contained in the secure metadata file can be used to generate the file key.
  • the security processing time is the current time for generating a file key based on the original data file and performing a security processing.
  • the security parameter is a public parameter that needs to be used in the security processing and security analysis processing.
  • the security parameter can be a parameter of the cryptosystem based on the Discrete Logarithm Problem, including but not limited to the discrete logarithm problem in the Finite field and the discrete logarithm problem on Elliptic Curve.
  • the random information is used for increasing the randomness of the generated file key.
  • the security parameter comprise the group order p and the group generator g
  • the random information is gy, where y is a random number from 1 to p-1
  • the user key is x
  • x is the output of the one-way function KDF after inputting information such as FileInfo, UserInfo, TimeInfo, Secret
  • the FileInfo comprises file information such as the file name, the file identifier and/or the last modification time
  • the UserInfo is the user information
  • the TimeInfo is the current time
  • the Secret is the user key
  • the KDF is the hash function (such as SHA2) in the cryptographic security or the key derivation function
  • the generated file key is gyx.
  • the access control list is used to record the access permission of the original data file, it may comprise a user name and an ACL entry that are used to identify a user having the access permission.
  • the ACL entry comprises a protection-processed file key, the protection processing may be encrypting the file key or a way described in the following specific embodiment:
  • step 202 the step of generating a file key is specifically:
  • the step of performing a security analysis processing on the secure data file based on the file key comprises:
  • the method for downloading files from the cloud storage system in accordance with the embodiment of the present invention provides users with an end-to-end confidentiality and integrity protection and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
  • the embodiment of the present invention further provides a device for uploading files to a cloud storage system, applied to a client end, and comprising:
  • the abovementioned first generating module 401 may be configured to: generate the file key based on the pre-generated user key and at least the file information; for example, generate the file key based on the pre-generated user key and file information, as well as the obtained user information, the current time, and the random information generated by the client end itself.
  • the file information includes but is not limited to: the file name and the file identifier, extracted from the original data file, and optionally, a last modification time.
  • the first processing module 402 is configured to: encrypt part or all of the content of the original data file, and/or perform an integrity protection processing on the original data file.
  • the encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key; the key used for performing an integrity protection processing on the original data file is: the file key or a second derived key derived based on the file key.
  • the first derived key and the second derived key may be different keys.
  • the uploading module can also be configured to: further send information used to generate the key file, except of the user key, to the cloud storage system.
  • the device for uploading files to the cloud storage system in accordance with the embodiment of the present invention is a device corresponding to the abovementioned method for uploading files to the cloud storage system, all implementations in the abovementioned method are applicable to the device embodiments to similarly achieve: providing users with an end-to-end confidentiality and integrity protection and solving the problem in the related art that the data storage security in the cloud storage system is relatively poor.
  • the embodiment of the present invention further provides a device for downloading files from a cloud storage device, comprising:
  • the downloading module 501 is further configured to: receive related file information sent by the cloud storage system based on the downloading request.
  • the abovementioned second generating module 502 is configured to: generate the file key based on the pre-generated user key and at least the file information, for example, generate the file key based on the pre-generated user key and the file information, as well as the obtained user information, the current time, and the random information generated by the client end itself.
  • the second process module 503 is configured to: decrypt some or all of the content of the secure data file, and/or perform an integrity protection verification processing on the secure data file.
  • the key used for decrypting part or all the content of the secure data file and the key used for performing the integrity protection verification processing on the secure data file may be different keys.
  • the device for downloading files from a cloud storage in accordance with the embodiment of the present invention provides users with an end-to-end confidentiality and integrity protection and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
  • the device for downloading files from the cloud storage system is a device corresponding to the abovementioned downloading method, wherein all implementations in the downloading method embodiments are suitable for the downloading device embodiments to achieve the similar technical effect.
  • the present invention With the method for uploading files to cloud storage system in accordance with the embodiment of the present invention, when a user uploads a data file at the client end, firstly a file key is generated, and then a security processing is performed on the original data file based on the file key and a secure data file is generated, and then the secure data file is sent to the cloud storage system for storage. It provides an end-to-end confidentiality and integrity protection for data stored by the user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor. Therefore the present invention has strong industrial applicability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

Disclosed are a method for uploading files to a cloud storage system, a downloading method and a device, wherein the method for uploading files to cloud storage system is applied to a client end, including: generating a file key; performing a security processing on an original data file according to the file key and generating a secure data file; sending the secure data file to a cloud storage system. The abovementioned technical solution provides an end-to-end confidentiality and integrity protection for data stored by a user in a cloud storage system, thus solving the problem that the data storage security in the cloud storage system is relatively poor.

Description

    Technical Field
  • The present invention relates to the technical field of uploading files to a cloud storage system, and more particularly, to a method for uploading files to a cloud storage system, a downloading method and device.
  • Background of the Related Art
  • With the rapid development of cloud storage, more and more people or services start choosing to use the cloud storage environment for storing their data, cloud storage users can upload their files to the cloud storage environment for the cloud storage service provider to carry out the file management, and designate access rights to other users for accessing the files, thus achieving the file sharing.
  • However, the cloud storage environment makes the data owners lose complete control of the data, which makes the data security face a series of threats, such as: DOS attacks using large-scale botnets, attacks exploiting vulnerabilities of operating systems or application service protocols, as well as malicious attacks, theft and illegal misuse target the user privacy information stored in the "cloud", etc., and there are various means for that. In addition, various systems and applications residing in the "cloud" still have to face threats such as viruses, Trojans and other malicious software tools which are faced in the traditional stand-alone machine or intra-net environment. If sensitive data (including: financial documents, personal medical records) are stored in a cloud storage environment controlled by others, the above mentioned problems will become more serious with the number of users who share the storage increasing. Therefore, systems based on cloud storage services have very urgent needs for security mechanisms.
  • Summary of the Invention
  • To solve the technical problem, the embodiment of the present invention is to provide a method for uploading files to a cloud storage system, a downloading method and device, to solve the problem in the related art that data storage security in a cloud storage system is relatively poor.
  • To solve the abovementioned technical problem, the following technical solution is used:
    • a method for uploading files to a cloud storage system, applied to a client end, and comprising:
      • generating a file key;
      • performing a security processing on an original data file according to the file key and generating a secure data file;
      • sending the secure data file to a cloud storage system.
      • Alternatively, the step of generating a file key comprises:
        • generating the file key based on a pre-generated user key and file information.
  • Alternatively, the file information comprises: a file name, a file identifier and a last modification time extracted from the original data file.
  • Alternatively, the step of performing a security processing on an original data file according to the file key and generating a secure data file comprises:
    • encrypting part or all of content of the original data file, and/or performing an integrity protection processing on the original data file.
  • Alternatively, an encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key;
    a key used for performing an integrity protection processing on the original data file is: the file key, or a second derived key derived based on the file key.
  • Alternatively, it further comprises:
    • sending information for generating the file key, except of the user key, to the cloud storage system.
  • A method for downloading files from a cloud storage system, comprising:
    • receiving a secure data file sent by a cloud storage system based on a downloading request;
    • generating a file key;
    • performing a security analysis processing on the secure data file based on the file key.
  • Alternatively, it further comprises:
    • receiving related file information sent by the cloud storage system based on the downloading request.
  • Alternatively, the related file information comprises: a secure metadata file.
  • Alternatively, the secure metadata file comprises one or more of a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list.
  • Alternatively, the step of performing a security analysis processing on the secure data file based on the file key comprises:
    • decrypting some or all of content of the secure data file, and/or performing an integrity protection verification processing on the secure data file.
  • A device for uploading files to a cloud storage system, applied to a client end, and comprising a first generating module, a first processing module and an uploading module, wherein:
    • the first generating module is configured to: generate a file key;
    • the first processing module is configured to: perform a security processing on an original data file based on the file key and generate a secure data file;
    • the uploading module is configured to: send the secure data file to a cloud storage system.
  • A device for downloading files from a cloud storage system, comprising a downloading module, a second generating module and a second processing module, wherein:
    • the downloading module is configured to: receive a secure data file sent by a cloud storage system based on a downloading request;
    • the second generating module is configured to: generate a file key;
    • the second processing module is configured to: perform a security analysis processing on the secure data file based on the file key.
  • The beneficial effects of the abovementioned technical solution are as follows:
    • With the method for uploading files to cloud storage system in accordance with the embodiment of the present invention, when a user uploads a data file at the client end, firstly a file key is generated, and then a security processing is performed on the original data file based on the file key and a secure data file is generated, and then the secure data file is sent to the cloud storage system for storage. It provides an end-to-end confidentiality and integrity protection for data stored by the user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
    Brief Description of the Drawings
    • FIG. 1 is a flow chart of a method for uploading files to a cloud storage system in accordance with an embodiment of the present invention;
    • FIG. 2 is a flow chart of a method for downloading files from a cloud storage system in accordance with an embodiment of the present invention;
    • FIG. 3 is a block diagram of a secure metadata file in accordance with an embodiment of the present invention;
    • FIG. 4 is a block diagram of a device for uploading files to a cloud storage system in accordance with an embodiment of the present invention;
    • FIG. 5 is a block diagram of a device for downloading files from a cloud storage in accordance with an embodiment of the present invention.
    Preferred Embodiments of the Invention
  • Hereinafter, in conjunction with the accompanying drawings and specific embodiments, the present invention will be described in detail.
  • The method for uploading files to a cloud storage system in accordance with an embodiment of the present invention provides an end-to-end confidentiality and integrity protection for data stored by a user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
  • As shown in FIG. 1, the method for uploading files to a cloud storage system in accordance with an embodiment of the present invention is applied to the client end and comprises:
    • in step 101, it is to generate a file key;
    • in step 102, it is to perform a security processing on the original data file based on the file key and generate a secure data file;
    • in step 103, it is to send the secure data file to the cloud storage system.
  • In the method for uploading files to the cloud storage system in accordance with the embodiment of the present invention, firstly, when the user uploads a data file at the client end, firstly a file key is generated, and then a security processing is performed on the original data file based on the file key and a secure data file is generated, and then the secure data file is sent to the cloud storage system for storage. It provides an end-to-end confidentiality and integrity protection for data stored by the user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
  • In the abovementioned step 101, the file key is generated based on a pre-generated user key and at least file information, the following specific embodiments are used for illustration rather than limitation:
    • in a specific embodiment, the file key is generated based on the user key, the file information, and user information such as the user name, the user identifier and the current time obtained by the client end;
    • in a specific embodiment, the file key is generated based on the user key, the file information, as well as the user information such as the user name and the user identifier obtained by the client end, and the random information generated by the client end itself.
  • Wherein, the file information includes but is not limited to: a file name, a file identifier, and optionally, a last modification time extracted from the original data file.
  • In a specific embodiment of the present invention, the user information may be a user name, a user identifier, and so on, which are not enumerated herein. Wherein, the information input by the user can be password information.
  • In the abovementioned step 102, the step of performing a security processing on the original data file based on the file key and generating a secure data file comprises:
    • encrypting part or all of the content of the original data file, and/or performing an integrity protection processing on the original data file.
  • Specifically, the encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key; the key used for performing an integrity protection processing on the original data file is: the file key, or a second derived key derived based on the file key.
  • The method for uploading files to the cloud storage system in accordance with an embodiment of the present invention may further comprise:
    • sending information for generating the file key, except of the user key, to the cloud storage system.
  • In the following, the specific embodiment of the present invention will be described as follows:
    • when the user uploads files to the cloud storage system at the client end, first, a file key is generated based on the user key pre-generated by the client end and the file information extracted from the original data file; wherein, the file information, as well as the user information, the current time, and the random information used when generating the file key, can be all saved and transferred in the form of files;
  • then part or all of the content of the original data file is encrypted based on the file key, and/or integrity protection processing is performed; keys used in the encryption and integrity protection may be different; the processing order of the encryption and the integrity protection is not restricted, the encryption may be performed first, and then integrity protection is performed on the cipher text; or integrity protection is performed on the original data file first, and then encryption is performed.
  • Finally, the secure data file and the information for generating the file key, except of the user key, are sent to the cloud storage system to improve the data storage security.
  • As shown in FIG. 2, the embodiment of the present invention further provides a method for downloading files from the cloud storage system, comprising:
    • in step 201, it is to receive a secure data file sent by the cloud storage system based on a downloading request;
    • in step 202, it is to generate a file key;
    • in step 203, it is to perform a security analysis processing on the secure data file based on the file key.
  • In the method for downloading files from the cloud storage system in accordance with an embodiment of the present invention, when the user downloads files from the cloud storage system, firstly the secure data file sent by the cloud storage system according to the downloading request is received, and then a file key is generated, a security analysis processing is performed on the secure data file according to the file key, so as to solve the problem that the data storage security in the cloud storage system is relatively poor.
  • The method for downloading files from the cloud storage system in accordance with an embodiment of the present invention further comprises:
    • receiving related file information sent by the cloud storage system based on the downloading request.
  • Wherein the related file information comprises: a secure metadata file. Specifically, the secure metadata file may comprise one or more of a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list. As the specific embodiment shown in FIG. 3, the secure metadata file comprises a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list, but what is shown in FIG. 3 is only an example of the secure metadata file, the content and format of the secure metadata file are not limited to the content and format shown in FIG. 3, for example, the secure metadata file may also comprise: the file name, the file identifier, the file owner identifier, the last modification time, the security processing time, the random information, the security parameter and the access control list; the secure metadata file may further comprise other content.
  • In specific embodiments of the present invention, the information contained in the secure metadata file can be used to generate the file key. Wherein, the security processing time is the current time for generating a file key based on the original data file and performing a security processing. Wherein, the security parameter is a public parameter that needs to be used in the security processing and security analysis processing. Specifically, the security parameter can be a parameter of the cryptosystem based on the Discrete Logarithm Problem, including but not limited to the discrete logarithm problem in the Finite field and the discrete logarithm problem on Elliptic Curve. Wherein, the random information is used for increasing the randomness of the generated file key.
  • In a specific embodiment, the security parameter comprise the group order p and the group generator g, the random information is gy, where y is a random number from 1 to p-1, the user key is x, where x is the output of the one-way function KDF after inputting information such as FileInfo, UserInfo, TimeInfo, Secret, wherein, the FileInfo comprises file information such as the file name, the file identifier and/or the last modification time, the UserInfo is the user information, the TimeInfo is the current time, the Secret is the user key, and the KDF is the hash function (such as SHA2) in the cryptographic security or the key derivation function, and the generated file key is gyx.
  • In a specific embodiment of the present invention, the access control list is used to record the access permission of the original data file, it may comprise a user name and an ACL entry that are used to identify a user having the access permission. Wherein, the ACL entry comprises a protection-processed file key, the protection processing may be encrypting the file key or a way described in the following specific embodiment:
    • assuming that the user IDz is a user having a file access permission recorded in the access control list, the file key of the secure data file is the abovementioned gyx, the ACL entry is (gz) yx, where the gz is the public key of the corresponding user IDz, and the z is the private key of the corresponding user IDz, then after the user receives a secure metadata file that contains the ACL entry, the user can recover the file key gyx based on the private key z, then perform a security analysis processing on the received secure data file based on the file key.
  • In the abovementioned step 202, the step of generating a file key is specifically:
    • generating the file key based on the pre-generated user key and at least the file information; for example, generating the file key based on the pre-generated user key and the file information, as well as the obtained user information, the current time, and the random information generated by the client end itself.
  • In the abovementioned step 203, the step of performing a security analysis processing on the secure data file based on the file key comprises:
    • decrypting some or all of the content of the secure data file, and/or performing an integrity protection verification processing on the secure data file. Wherein, the key used for decrypting part or all the content of the secure data file and the key used for performing the integrity protection check processing on the secure data file may be different keys.
  • The method for downloading files from the cloud storage system in accordance with the embodiment of the present invention provides users with an end-to-end confidentiality and integrity protection and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
  • As shown in FIG. 4, the embodiment of the present invention further provides a device for uploading files to a cloud storage system, applied to a client end, and comprising:
    • A first generating module 401, configured to generate a file key;
    • A first processing module 402, configured to perform a security processing on an original data file based on the file key and generate a secure data file;
    • An uploading module 403, configured to send the secure data file to the cloud storage system.
  • Wherein, in this embodiment, the abovementioned first generating module 401 may be configured to: generate the file key based on the pre-generated user key and at least the file information; for example, generate the file key based on the pre-generated user key and file information, as well as the obtained user information, the current time, and the random information generated by the client end itself.
  • Wherein, the file information includes but is not limited to: the file name and the file identifier, extracted from the original data file, and optionally, a last modification time.
  • Alternatively, the first processing module 402 is configured to: encrypt part or all of the content of the original data file, and/or perform an integrity protection processing on the original data file.
  • Wherein, the encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key; the key used for performing an integrity protection processing on the original data file is: the file key or a second derived key derived based on the file key. Wherein, the first derived key and the second derived key may be different keys.
  • In the device for uploading files to the cloud storage system in accordance with the embodiment of the present invention, the uploading module can also be configured to: further send information used to generate the key file, except of the user key, to the cloud storage system.
  • The device for uploading files to the cloud storage system in accordance with the embodiment of the present invention is a device corresponding to the abovementioned method for uploading files to the cloud storage system, all implementations in the abovementioned method are applicable to the device embodiments to similarly achieve: providing users with an end-to-end confidentiality and integrity protection and solving the problem in the related art that the data storage security in the cloud storage system is relatively poor.
  • As shown in FIG. 5, the embodiment of the present invention further provides a device for downloading files from a cloud storage device, comprising:
    • A downloading module 501, configured to receive a secure data file sent by the cloud storage system based on a downloading request;
    • A second generating module 502, configured to generate a file key;
    • A second processing module 503, configured to perform a security analysis processing on the secure data file based on the file key.
  • Wherein, in the downloading device, the downloading module 501 is further configured to: receive related file information sent by the cloud storage system based on the downloading request.
  • Furthermore, the abovementioned second generating module 502 is configured to: generate the file key based on the pre-generated user key and at least the file information, for example, generate the file key based on the pre-generated user key and the file information, as well as the obtained user information, the current time, and the random information generated by the client end itself.
  • The second process module 503 is configured to: decrypt some or all of the content of the secure data file, and/or perform an integrity protection verification processing on the secure data file. Wherein, the key used for decrypting part or all the content of the secure data file and the key used for performing the integrity protection verification processing on the secure data file may be different keys.
  • The device for downloading files from a cloud storage in accordance with the embodiment of the present invention provides users with an end-to-end confidentiality and integrity protection and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
  • It should be noted that the device for downloading files from the cloud storage system is a device corresponding to the abovementioned downloading method, wherein all implementations in the downloading method embodiments are suitable for the downloading device embodiments to achieve the similar technical effect.
  • The above description is preferred embodiments of the present invention, and it should be noted that, for those ordinary skilled in the art, a number of improvements and modifications can also be made without departing from the principles of the present invention, and these improvements and modifications should also be considered as in the protection scope of the present invention.
  • Industrial Applicability
  • With the method for uploading files to cloud storage system in accordance with the embodiment of the present invention, when a user uploads a data file at the client end, firstly a file key is generated, and then a security processing is performed on the original data file based on the file key and a secure data file is generated, and then the secure data file is sent to the cloud storage system for storage. It provides an end-to-end confidentiality and integrity protection for data stored by the user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor. Therefore the present invention has strong industrial applicability.

Claims (13)

  1. A method for uploading files to a cloud storage system, applied to a client end, and comprising:
    generating a file key;
    performing a security processing on an original data file according to the file key and generating a secure data file;
    sending the secure data file to a cloud storage system.
  2. The method for uploading files to a cloud storage system of claim 1, wherein, the step of generating a file key comprises:
    generating the file key based on a pre-generated user key and file information.
  3. The method for uploading files to a cloud storage system of claim 2, wherein, the file information comprises: a file name, a file identifier and a last modification time extracted from the original data file.
  4. The method for uploading files to a cloud storage system of claim I, wherein, the step of performing a security processing on an original data file according to the file key and generating a secure data file comprises:
    encrypting part or all of content of the original data file, and/or performing an integrity protection processing on the original data file.
  5. The method for uploading files to a cloud storage system of claim 4, wherein,
    an encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key;
    a key used for performing an integrity protection processing on the original data file is: the file key, or a second derived key derived based on the file key.
  6. The method for uploading files to a cloud storage system of claim 1, further comprising:
    sending information for generating the file key, except of the user key, to the cloud storage system.
  7. A method for downloading files from a cloud storage system, comprising:
    receiving a secure data file sent by a cloud storage system based on a downloading request;
    generating a file key;
    performing a security analysis processing on the secure data file based on the file key.
  8. The method for downloading files from a cloud storage system of claim 7, further comprising:
    receiving related file information sent by the cloud storage system based on the downloading request.
  9. The method for downloading files from a cloud storage system of claim 8, wherein, the related file information comprises: a secure metadata file.
  10. The method for downloading files from a cloud storage system of claim 9, wherein, the secure metadata file comprises one or more of a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list.
  11. The method for downloading files from a cloud storage system of claim 7, wherein, the step of performing a security analysis processing on the secure data file based on the file key comprises:
    decrypting some or all of content of the secure data file, and/or performing an integrity protection verification processing on the secure data file.
  12. A device for uploading files to a cloud storage system, applied to a client end, and comprising a first generating module, a first processing module and an uploading module, wherein:
    the first generating module is configured to: generate a file key;
    the first processing module is configured to: perform a security processing on an original data file based on the file key and generate a secure data file;
    the uploading module is configured to: send the secure data file to a cloud storage system.
  13. A device for downloading files from a cloud storage system, comprising a downloading module, a second generating module and a second processing module, wherein:
    the downloading module is configured to: receive a secure data file sent by a cloud storage system based on a downloading request;
    the second generating module is configured to: generate a file key;
    the second processing module is configured to: perform a security analysis processing on the secure data file based on the file key.
EP14794751.9A 2013-09-18 2014-05-30 Method for file upload to cloud storage system, download method and device Withdrawn EP3035641A4 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310430510.8A CN104468664A (en) 2013-09-18 2013-09-18 Method and device for uploading files to cloud storage system, and method and device for downloading files from cloud storage system
PCT/CN2014/078943 WO2014180416A1 (en) 2013-09-18 2014-05-30 Method for file upload to cloud storage system, download method and device

Publications (2)

Publication Number Publication Date
EP3035641A1 true EP3035641A1 (en) 2016-06-22
EP3035641A4 EP3035641A4 (en) 2016-08-31

Family

ID=51866796

Family Applications (1)

Application Number Title Priority Date Filing Date
EP14794751.9A Withdrawn EP3035641A4 (en) 2013-09-18 2014-05-30 Method for file upload to cloud storage system, download method and device

Country Status (3)

Country Link
EP (1) EP3035641A4 (en)
CN (1) CN104468664A (en)
WO (1) WO2014180416A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3441903A4 (en) * 2015-10-14 2019-10-23 Digital Arts Inc. Access management system, file access system, encryption device, and program
WO2020086133A1 (en) * 2018-10-24 2020-04-30 Microsoft Technology Licensing, Llc Offloading upload processing of a file in a distributed system using a key that includes a hash created using attribute(s) of a requestor and/or the file
CN115378659A (en) * 2022-07-28 2022-11-22 中国电子科技集团公司第三十研究所 High-reliability file encryption and fine-grained access control method based on user identity

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105025041B (en) * 2015-08-25 2019-03-12 北京百度网讯科技有限公司 The methods, devices and systems that file uploads
US10887371B2 (en) * 2015-09-14 2021-01-05 Google Llc Systems and methods for content storage and retrieval
CN105357202A (en) * 2015-11-12 2016-02-24 中国电子科技网络信息安全有限公司 Cloud platform user key management device and management method
CN106060099A (en) * 2016-08-15 2016-10-26 北京奇虎科技有限公司 Data access method and system, and devices
CN107154945A (en) * 2017-05-31 2017-09-12 中南大学 A kind of cloudy fragmentation method for secure storing and system based on correcting and eleting codes
CN107704769A (en) * 2017-09-21 2018-02-16 北京奇安信科技有限公司 A kind of data migration method and device based on marking file
KR102420158B1 (en) * 2017-12-27 2022-07-13 삼성전자주식회사 Storage device and storage system configured to perform encryption based on encryption key in file unit and method of operating using the same
CN109145602B (en) * 2018-07-06 2020-06-02 成都亚信网络安全产业技术研究院有限公司 Lesso software attack protection method and device
CN109922142B (en) * 2019-02-21 2022-04-19 创新先进技术有限公司 File downloading method, device and system
CN111865891B (en) * 2019-12-31 2023-08-15 北京嘀嘀无限科技发展有限公司 Data transmission method, user terminal, electronic equipment and readable storage medium
CN113553611A (en) * 2020-04-26 2021-10-26 中国电信股份有限公司 File encryption storage method and system, user terminal, cloud platform and storage medium
CN115484353A (en) * 2021-06-16 2022-12-16 中移动信息技术有限公司 Processing method suitable for watermark picture, electronic equipment and storage medium
CN113420300B (en) * 2021-06-21 2023-09-08 福建天晴数码有限公司 Method and system for detecting and defending file uploading loopholes
CN113918981B (en) * 2021-12-14 2022-03-08 苏州浪潮智能科技有限公司 Attribute-based encryption method and system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001209583A (en) * 2000-01-26 2001-08-03 Sony Corp Recorded data regenerator and method for saved data processing and program distribution media
US8452957B2 (en) * 2010-04-27 2013-05-28 Telefonaktiebolaget L M Ericsson (Publ) Method and nodes for providing secure access to cloud computing for mobile users
US20110289310A1 (en) * 2010-05-20 2011-11-24 Selgas Thomas D Cloud computing appliance
CN103259762B (en) * 2012-02-16 2016-09-28 中兴通讯股份有限公司 A kind of file encryption based on cloud storage, decryption method and system
CN102685148B (en) * 2012-05-31 2014-10-15 清华大学 Method for realizing secure network backup system under cloud storage environment
CN103051664B (en) * 2012-08-14 2016-04-27 深圳市朗科科技股份有限公司 A kind of file management method of cloud storage system, device and this cloud storage system
CN102946440B (en) * 2012-12-04 2015-07-08 乐视致新电子科技(天津)有限公司 Automatic cloud synchronization and recovery system based on cloud storage technology

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3441903A4 (en) * 2015-10-14 2019-10-23 Digital Arts Inc. Access management system, file access system, encryption device, and program
WO2020086133A1 (en) * 2018-10-24 2020-04-30 Microsoft Technology Licensing, Llc Offloading upload processing of a file in a distributed system using a key that includes a hash created using attribute(s) of a requestor and/or the file
US11184423B2 (en) 2018-10-24 2021-11-23 Microsoft Technology Licensing, Llc Offloading upload processing of a file in a distributed system using a key that includes a hash created using attribute(s) of a requestor and/or the file
CN115378659A (en) * 2022-07-28 2022-11-22 中国电子科技集团公司第三十研究所 High-reliability file encryption and fine-grained access control method based on user identity
CN115378659B (en) * 2022-07-28 2024-04-16 中国电子科技集团公司第三十研究所 High-reliability file encryption and fine-granularity access control method based on user identity

Also Published As

Publication number Publication date
EP3035641A4 (en) 2016-08-31
CN104468664A (en) 2015-03-25
WO2014180416A1 (en) 2014-11-13

Similar Documents

Publication Publication Date Title
EP3035641A1 (en) Method for file upload to cloud storage system, download method and device
US9432346B2 (en) Protocol for controlling access to encryption keys
Kaaniche et al. A secure client side deduplication scheme in cloud storage environments
EP3585032B1 (en) Data security service
US9852300B2 (en) Secure audit logging
RU2589861C2 (en) System and method of user data encryption
CN103731395B (en) The processing method and system of file
EP3149651A2 (en) System and method for secure review of audit logs
CN107453880B (en) Cloud data secure storage method and system
Manthiramoorthy et al. Comparing several encrypted cloud storage platforms
WO2019083379A1 (en) Data transmission
KR20210143846A (en) encryption systems
Junghanns et al. Engineering of secure multi-cloud storage
Hussien et al. Scheme for ensuring data security on cloud data storage in a semi-trusted third party auditor
Jang-Jaccard et al. Portable key management service for cloud storage
Mata et al. Enhanced secure data storage in cloud computing using hybrid cryptographic techniques (AES and Blowfish)
Paverd et al. Omnishare: Encrypted cloud storage for the multi-device era
Shah et al. Third party public auditing scheme for security in cloud storage
Thota et al. Split key management framework for Open Stack Swift object storage cloud
Nandini et al. Implementation of hybrid cloud approach for secure authorized deduplication
Karani et al. Secure File Storage Using Hybrid Cryptography
Pritha et al. Deduplication based storage and retrieval of data from cloud environment
Reddy et al. Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques
Xuan An End-to-End Encryption Solution for Enterprise Content Applications
Patalbansi et al. Cloud storage system for mobile cloud computing using blockchain

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20160315

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

A4 Supplementary search report drawn up and despatched

Effective date: 20160801

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 29/08 20060101AFI20160726BHEP

Ipc: H04L 29/06 20060101ALI20160726BHEP

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20190529

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20190821